US12407609B2 - Methods for shunting clustered gateways - Google Patents
Methods for shunting clustered gatewaysInfo
- Publication number
- US12407609B2 US12407609B2 US17/657,708 US202217657708A US12407609B2 US 12407609 B2 US12407609 B2 US 12407609B2 US 202217657708 A US202217657708 A US 202217657708A US 12407609 B2 US12407609 B2 US 12407609B2
- Authority
- US
- United States
- Prior art keywords
- packet
- port
- public network
- machine
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup; Address filtering
- H04L45/7453—Address table lookup; Address filtering using hashing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4633—Interconnection of networks using encapsulation techniques, e.g. tunneling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/66—Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2212/00—Encapsulation of packets
Definitions
- the present disclosure relates to the field of computer technologies, and in particular, to the fields of cloud computing, data centers, and servers.
- shunting of clustered gateways is mainly implemented by achieving an algorithm for selecting a public network IP on a shunt, and all NAT rules in a cluster need to be configured on the shunt, so as to ensure that a user can select a correct public network IP among multiple public network IPs.
- the present disclosure provides method for shunting clustered gateways.
- a method for shunting clustered gateways may include: in response to receiving a first packet sent by a target internal network machine, a first hash value is acquired, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary; a target gateway machine is selected from the public network gateway cluster according to the first hash value; and the first packet is sent to the target gateway machine.
- the method may include: a first packet is received from a shunt of a public network gateway cluster, wherein in response to the shunt receiving the first packet sent by a target internal network machine, a first hash value is acquired, and according to the first hash value, a target gateway machine is selected from the public network gateway cluster, wherein the first hash value is generated by the shunt performing a hash calculation on the first packet based on a pre-configured port dictionary; and forwarding the first packet to a public network on the basis of at least one target port corresponding to the first packet.
- an apparatus for shunting clustered gateways may include: a first acquisition component, configured to acquire, in response to receiving a first packet sent by a target internal network machine is received, a first hash value, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary; a second acquisition component, configured to select, according to the first hash value, a target gateway machine from the public network gateway cluster; and a diversion component, configured to divert the first packet to the target gateway machine.
- the apparatus may include: a receiving component, configured to receive a first packet from a shunt of a public network gateway cluster, wherein in response to the shunt receiving the first packet sent by a target internal network machine, a first hash value is required, and according to the first hash value, a target gateway machine is selected from the public network gateway cluster, wherein the first hash value is generated by the shunt performing a hash calculation on the first packet based on a pre-configured port dictionary; and a forwarding component, configured to forward the first packet to a public network on the basis of at least one target port corresponding to the first packet.
- an electronic device may include: at least one processor; and a memory in communication connection with the at least one processor, wherein the memory stores instructions which can be executed by the at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor can perform the following steps: in response to receiving a first packet sent by a target internal network machine, a first hash value is acquired, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary; a target gateway machine is selected from the public network gateway cluster according to the first hash value; and the first packet is sent to the target gateway machine.
- a non-transitory computer-readable storage medium having computer instructions stored therein, wherein the computer instructions are used for enabling a computer to perform the following steps: in response to receiving a first packet sent by a target internal network machine, a first hash value is acquired, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary; a target gateway machine is selected from the public network gateway cluster according to the first hash value; and the first packet is sent to the target gateway machine.
- a computer program product when executed by a processor, performing following steps: in response to receiving a first packet sent by a target internal network machine, a first hash value is acquired, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary; a target gateway machine is selected from the public network gateway cluster according to the first hash value; and the first packet is sent to the target gateway machine.
- FIG. 1 is a flowchart of steps of a method for shunting clustered gateways according to a first embodiment of the present disclosure
- FIG. 2 is a schematic diagram of optional port fields according to the first embodiment of the present disclosure
- FIG. 3 is a schematic diagram of an optional method for selecting a gateway machine according to the first embodiment of the present disclosure
- FIG. 4 is a flowchart of steps of an optional method for shunting clustered gateways according to the first embodiment of the present disclosure
- FIG. 5 is a flowchart of steps of another optional method for shunting clustered gateways according to a second embodiment of the present disclosure
- FIG. 6 is a schematic structural diagram of an apparatus for shunting clustered gateways according to a third embodiment of the present disclosure.
- FIG. 7 is a block diagram of an optional electronic device for implementing embodiments of the present disclosure.
- Clustered gateway traffic for accessing a public network service through the same public network IP can be distributed on multiple machines of an NAT cluster.
- Hash bucket representing a container for holding different key code linked lists, and is a method for solving hash table conflicts. Multiple elements may exist in the same position of a hash table, and in order to deal with the hash collision, each position in the hash table represents one hash bucket.
- the hash table is a data structure directly accessed according to key codes.
- an embodiment of a method for shunting clustered gateways is provided. It should be noted that steps illustrated in flowchart of the drawings can be executed in a computer system such as a set of computer-executable instructions, and although a logical order is shown in the flowchart, in some cases, the steps shown or described can be executed in a different order from that described herein.
- FIG. 1 is a flowchart of steps of a method for shunting clustered gateways according to a first embodiment of the present disclosure. As shown in FIG. 1 , the method includes the following steps.
- a first hash value is received, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary.
- a target gateway machine is selected from the public network gateway cluster according to the first hash value.
- the first packet is sent to the target gateway machine.
- the first packet is an original outbound packet, i.e. a network data packet that is sent by the target internal network machine and has not undergone network address translation
- the first hash value is a hash value obtained by performing hash calculation on the original outbound packet.
- the hash calculation may be, but is not limited to, a 5-tuple hash algorithm through which to perform hash calculation on the first packet; and the gateway machine may be, but is not limited to, a network address translation machine.
- the pre-configured port dictionary may be, but is not limited to, a port dictionary pre-generated through a port range of a TCP/IP, and the port range may include, but is not limited to, a port range 0-65535 specified by the TCP/IP.
- a port dictionary is pre-generated and stored in the shunt and all gateway machines, and is generated during cluster initialization. Only a static hash dictionary needs to be configured, and once the static hash dictionary is configured, the hash dictionary does not need to be modified.
- shunting algorithms are independent of service types, and only the static hash dictionary needs to be configured, and once static hash dictionary is configured, the hash dictionary does not need to be modified.
- the shunt in the method for shunting clustered gateways does not need to be configured with service-related network address translation rules, and high-speed hardware can be used for implementing shunting operation of the clustered gateways, greatly increasing a forwarding efficiency of the shunt and reducing resource consumption.
- a first hash value is received, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary; a target gateway machine is selected from the public network gateway cluster, according to the first hash value; and the first packet is sent to the target gateway machine, to achieve that sending a packet to a target gateway machine on the basis of a pre-configured port dictionary, thereby the technical effects of increasing the forwarding efficiency of a shunt and reducing resource consumption is achieved.
- the method before the shunt of the public network gateway cluster receives the first packet sent by the target internal network machine, the method further comprises: the port dictionary is configured on the basis of a preset port range.
- the port dictionary is information configured on the shunt of the public network gateway cluster and at least one public network machine
- at least one port field in the port dictionary include: at least one hash bucket and at least one port linked list, each of the at least one hash bucket comprising one port linked list, and multiple non-repeated addresses are existed in one port linked lists of different hash buckets.
- the pre-configured port dictionary may be, but is not limited to, a port dictionary pre-generated through a port range of a TCP/IP stack, and the port range may include, but is not limited to, a port range 0-65535 specified by the TCP/IP.
- the port field of the port dictionary are consisted of two parts, i.e. at least one hash bucket and at least one port linked list, wherein one port linked list exists in each of the at least one hash bucket, and multiple non-repeated addresses are existed in the one port linked lists of different hash buckets, to ensure that when shunting of large-scale clustered gateways is performed, public network IPs and ports allocated for use by different gateway machines are not repeated.
- the port dictionary is a static port dictionary, generated during cluster initialization, stored in the shunt and all gateway machines, and does not change once the port dictionary is generated.
- FIG. 2 is a schematic diagram of optional port fields according to the first embodiment of the present disclosure.
- the port fields there are 1024 hash buckets (i.e. hash bucket 0 to hash bucket 1023) which correspond to port linked list 0 to port linked list 1023 respectively, that is to say, each hash bucket corresponds to one port linked list, and multiple non-repeated addresses exist on one port linked list of each of the hash buckets.
- address information in a port linked list 0 corresponding to a hash bucket 0 includes an address 0, an address 01024, . . .
- address information corresponding to a port linked list 1 corresponding to a hash bucket 1 comprises an address 1, an address 01025, . . . , and an address 064513, to ensure that when shunting of large-scale clustered gateways is performed, public network IPs and ports allocated for use by different gateway machines are not repeated.
- a target gateway machine is selected from the public network gateway cluster, according to the first hash value includes:
- the first hash value and each public network machine have a many-to-one mapping relationship, that is to say, each public network machine may correspond to multiple first hash values.
- mapping relationship between each public network machine in the public network gateway cluster and the first hash value is acquired, and the target gateway machine from the public network gateway cluster is selected on the basis of the mapping relationship and the first hash value, to achieve that when shunting of large-scale clustered gateways is performed, inbound traffic and outbound traffic of the same flow is shunted to the same gateway machine for processing.
- FIG. 3 is a schematic diagram of an optional method for selecting a gateway machine according to the first embodiment of the present disclosure.
- the outbound traffic and the inbound traffic correspond to different hash values, i.e. a hash value 1 and a hash value 2.
- the outbound traffic and the inbound traffic are transmitted to a gateway machine 1 by means of dispatchers, so as to ensure that the inbound traffic and the outbound traffic of the same flow are shunted to the same gateway machine for processing.
- the first packet is sent to the target gateway machine includes following steps.
- the first packet is encapsulated through the shunt to obtain a first tunnel packet.
- the first tunnel packet is sent to the target gateway machine through a diverter after writing the first hash value into an outer-layer field of the first tunnel packet.
- the target gateway machine is used for forwarding the first tunnel packet to a public network on the basis of at least one target port corresponding to the first tunnel packet.
- the first hash value is written into the outer-layer field of the first tunnel packet, wherein the first tunnel packet is obtained by encapsulating the first packet by the shunt; the first tunnel packet is sent to the target gateway machine through a diverter, wherein after the target gateway machine receives the first tunnel packet sent by the diverter, a hash bucket is selected according to a hash value corresponding to the first tunnel packet, and a target port corresponding to the first tunnel packet is selected from a port linked list of the hash bucket; and network address translation processing is performed on an inner-layer packet of the first tunnel packet, so as to obtain translated inner-layer packet, and a target port corresponding to the first tunnel packet is selected through the target gateway machine, and the first tunnel packet is forwarded to a public network.
- the present embodiment by encapsulating the first packet through the shunt to obtain the first tunnel packet; and the first tunnel packet is sent to the target gateway machine through the diverter after the first hash value is written into an outer-layer field of the first tunnel packet, to achieve that a packet is divert to the target gateway machine on the basis of the pre-configured port dictionary, thereby technical effects of increasing the forwarding efficiency of a shunt is achieved and resource consumption is reduced.
- FIG. 4 is a flowchart of steps of an optional method for shunting clustered gateways according to the first embodiment of the present disclosure. As shown in FIG. 4 , the method for shunting clustered gateways includes the following steps.
- step S 402 after a second packet sent by a router of the public network to the shunt is received, at least one hash bucket is queried on the basis of the port dictionary through the shunt, and hash calculation is performed on the second packet to obtain a second hash value.
- the target gateway machine is selected from the public network gateway cluster according to the second hash value, and the second packet is encapsulated through the shunt to obtain a second tunnel packet.
- the second tunnel packet is sent to the target gateway machine, wherein the target gateway machine is used for sending the second tunnel packet to the target internal network machine after performing network address translation on the basis of a predetermined connection trace table.
- the second packet is an inbound packet, wherein the inbound packet is obtained by forwarding by the router of the public network; and the second hash value is obtained by performing hash calculation on the second packet (i.e. the inbound packet), wherein the hash calculation may be, but is not limited to, performing hash calculation on the second packet by using a 5-tuple hash algorithm.
- connection trace table is used for recording a source IP address, a source port, a protocol, a destination IP address, destination port information before network address translation, and a source IP address, a source port, a protocol, a destination IP address, and destination port information after the network address translation, wherein information before network address translation and information after network address translation which are recorded in the connection trace table with a one-to-one correspondence relationship, and after the target gateway machine can perform network address translation according to the connection trace table, the second tunnel packet is sent to the target internal network machine, so as to ensure that inbound traffic and outbound traffic of the same flow are shunted to the same gateway machine for processing.
- the method for shunting clustered gateways includes the following method steps.
- step S 502 receiving a first packet from a shunt of a public network gateway cluster.
- step S 504 forwarding the first packet to a public network on the basis of a target port corresponding to the first packet.
- the first packet is an original outbound packet, i.e. a network data packet that is sent by a target internal network machine and has not undergone network address translation.
- a first hash value obtained by performing hash calculation on the first packet is acquired, and a target gateway machine is selected from the public network gateway cluster according to the first hash value, wherein the first hash value is generated by the shunt performing the hash calculation on the first packet on the basis of a pre-configured port dictionary.
- a mapping relationship between each public network machine in the public network gateway cluster and the first hash value is acquired, and the target gateway machine is selected from the public network gateway cluster on the basis of the mapping relationship and the first hash value, wherein a many-to-one mapping relationship is existed between the first hash value and each public network machine.
- the first packet from the shunt of the public network gateway cluster is received, the first packet is forwarded to a public network on the basis of a target port corresponding to the first packet, to ensure that public network IPs and ports allocated for use by different gateway machines are not repeated, when shunting of large-scale clustered gateways is performed, thereby the technical effect of increasing the forwarding efficiency of a shunt is achieved.
- a first packet from a shunt of a public network gateway cluster is received includes: a first tunnel packet sent through a diverter of the shunt is received.
- the shunt encapsulates the first packet to obtain a first tunnel packet, and writes the first hash value into an outer-layer field of the first tunnel packet.
- the first tunnel packet at least includes an outer-layer field and an inner-layer field, wherein the first hash value is written into the outer-layer field of the first tunnel packet, network address translation processing is performed on the inner-layer packet, and the translated inner-layer field is sent to the public network.
- FIG. 5 is a flowchart of steps of another optional method for shunting clustered gateways according to a second embodiment of the present disclosure. As shown in FIG. 5 , forwarding the first packet to a public network on the basis of a target port corresponding to the first packet comprises the following steps.
- At step S 602 at least one hash bucket is selected according to the first hash value of the first tunnel packet, and a target port is selected to be used from a port linked list of each of the at least one hash bucket.
- step S 604 network address translation is performed on an inner-layer packet of the first tunnel packet, so as to obtain a translated inner-layer packet.
- the translated inner-layer packet is forwarded to the public network on the basis of the at least one target port.
- a diverter is used for sending the first tunnel packet to the target gateway machine, after the target gateway machine receives the first tunnel packet sent by the diverter, a hash bucket is selected according to a hash value corresponding to the first tunnel packet, and a target port corresponding to the first tunnel packet is selected from a port linked list of the hash bucket; and network address translation processing is performed on an inner-layer packet of the first tunnel packet, so as to obtain the translated inner-layer packet, and a target port corresponding to the first tunnel packet is selected through the target gateway machine, and the first tunnel packet is forwarded to a public network.
- a hash bucket is selected according to the first hash value of the first tunnel packet, and a target port is selected to be used from a port linked list of the hash bucket; network address translation is performed on an inner-layer packet of the first tunnel packet, so as to obtain a translated inner-layer packet; and the translated inner-layer packet is forwarded to the public network on the basis of the target port, to achieve that a packet is sent to a target gateway machine on the basis of a pre-configured port dictionary.
- FIG. 6 is a schematic structural diagram of an apparatus for shunting clustered gateways according to a third embodiment of the present disclosure. As shown in FIG. 6 , the apparatus for shunting clustered gateways comprises: a first acquisition component 700 , a second acquisition component 702 , and a diversion component 704 .
- the first acquisition component 700 is configured to acquire, in response to receiving a first packet sent by a target internal network machine, a first hash value, wherein the first hash value is generated by a shunt of a public network gateway cluster, and the shunt is configured to perform a hash calculation on the first packet based on a pre-configured port dictionary; the second acquisition component 702 is configured to select, according to the first hash value, a target gateway machine from the public network gateway cluster; and the diversion component 704 is configured to divert the first packet to the target gateway machine.
- the components can be implemented by software or hardware.
- the latter may be implemented in the following manner: the components can be located in the same processor; or the components are located in different processors in an arbitrary combination manner.
- the first acquisition component 700 , the second acquisition component 702 , and the diversion component 704 correspond to step S 102 to step S 106 in the Embodiment, and examples and application scenarios implemented by the components are the same as those implemented by the corresponding steps, but are not limited to the content disclosed in the Embodiment. It should be noted that the components, as a part of the apparatus, can be run in a computer terminal.
- the apparatus further includes: a configuration component, configured to configure the port dictionary on the basis of a preset port range, wherein the port dictionary is information configured on the shunt of the public network gateway cluster and at least one public network machine, and at least one port field in the port dictionary includes: at least one hash bucket and at least one port linked list, each of the at least one hash bucket comprising one port linked list, and multiple non-repeated addresses are existed in the one port linked lists in each of the of different hash buckets.
- a configuration component configured to configure the port dictionary on the basis of a preset port range
- the port dictionary is information configured on the shunt of the public network gateway cluster and at least one public network machine
- at least one port field in the port dictionary includes: at least one hash bucket and at least one port linked list, each of the at least one hash bucket comprising one port linked list, and multiple non-repeated addresses are existed in the one port linked lists in each of the of different hash buckets.
- the second acquisition component includes: a third acquisition component, configured to acquire a mapping relationship between each public network machine in the public network gateway cluster and the first hash value, wherein a many-to-one mapping relationship is existed between the first hash value and each public network machine; and a selection component, configured to select the target gateway machine from the public network gateway cluster on the basis of the mapping relationship and the first hash value.
- the diversion component includes: a first encapsulation component, configured to encapsulate the first packet through the shunt to obtain a first tunnel packet; and an importing component, configured to send the first tunnel packet to the target gateway machine through a diverter after writing the first hash value into an outer-layer field of the first tunnel packet, wherein the target gateway machine is used for forwarding the first tunnel packet to a public network on the basis of at least one target port corresponding to the first tunnel packet.
- the apparatus further includes: a calculation component, configured to after receiving a second packet sent by a router of the public network to the shunt, query through the shunt and on the basis of the port dictionary to obtain at least one hash bucket, and perform hash calculation on the second packet to obtain a second hash value; a second encapsulating component, configured to select the target gateway machine from the public network gateway cluster according to the second hash value, and encapsulate the second packet through the shunt to obtain a second tunnel packet; and a sending component, configured to send the second tunnel packet to the target gateway machine, wherein the target gateway machine is used for sending the second tunnel packet to the target internal network machine after performing network address translation on the basis of a predetermined connection trace table.
- a calculation component configured to after receiving a second packet sent by a router of the public network to the shunt, query through the shunt and on the basis of the port dictionary to obtain at least one hash bucket, and perform hash calculation on the second packet to obtain a second hash value
- the apparatus may include: a receiving component, configured to receive a first packet from a shunt of a public network gateway cluster, wherein in response to the shunt receiving the first packet sent by a target internal network machine, a first hash value is acquired, and a target gateway machine is selected from the public network gateway cluster according to the first hash value, wherein the first hash value is generated by the shunt performing a hash calculation on the first packet based on a pre-configured port dictionary; and a forwarding component, configured to forward the first packet to a public network on the basis of at least one target port corresponding to the first packet.
- the receiving component includes: a first receiving sub-component, configured to receive a first tunnel packet sent by a diverter of the shunt, wherein a first tunnel packet is obtained by the shunt encapsulating the first packet, and the first hash value is written into an outer-layer field of the first tunnel packet.
- the forwarding component includes: a selection component, configured to select at least one hash bucket according to the first hash value of the first tunnel packet, and select the at least one target port to be used from a port linked list of each of the at least one hash bucket; a translation component, configured to perform network address translation on an inner-layer packet of the first tunnel packet, so as to obtain a translated inner-layer packet; and a first forwarding sub-component, configured to forward the translated inner-layer packet to the public network on the basis of the at least one target port.
- a selection component configured to select at least one hash bucket according to the first hash value of the first tunnel packet, and select the at least one target port to be used from a port linked list of each of the at least one hash bucket
- a translation component configured to perform network address translation on an inner-layer packet of the first tunnel packet, so as to obtain a translated inner-layer packet
- a first forwarding sub-component configured to forward the translated inner-layer packet to the public network on the basis of the at least one target
- the apparatus for shunting clustered gateways can further include at least one processor and at least one memory; the first acquisition component 700 , the second acquisition component 702 , and the diversion component 704 , etc., as program elements, are all stored in the at least one memory, and the at least one processor executes the program elements stored in the at least one memory to implement corresponding functions.
- the at least one processor includes a kernel, and the kernel calls a corresponding program element from the at least one memory, and one or more kernel may be provided.
- the at least one memory may include forms such as a non-permanent memory, a random access memory (RAM) and/or a non-transitory memory in a computer-readable medium, for example, a read-only memory (ROM) or a flash memory (flash RAM), and the memory includes at least one memory chip.
- the present disclosure further provides an electronic device, a non-transitory computer-readable storage medium, and a computer program product.
- FIG. 7 illustrates a schematic block diagram of an exemplary electronic device 800 which can be used for implementing the embodiments of the present disclosure.
- the electronic device is intended to represent various forms of digital computers, such as laptop computers, desktop computers, workstations, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers.
- the electronic device may also represent various forms of mobile apparatuses, such as at least one personal digital processor, at least one cellular telephone, at least one smart phone, at least one wearable device, and other similar computing apparatuses.
- the components, connections and relationships therebetween, and functions thereof illustrated herein are by way of examples only, and are not intended to limit the implementation of the embodiments of the present disclosure as described and/or claimed herein.
- the device 800 includes a calculation component 801 which may perform various suitable actions and processes according to a computer program stored in a read only memory (ROM) 802 or a computer program loaded into a random access memory (RAM) 803 from a storage component 808 .
- ROM read only memory
- RAM random access memory
- various programs and data necessary for the operation of the storage device 800 can also be stored.
- the calculation component 801 , the ROM 802 and the RAM 803 are connected to one another by means of a bus 804 .
- An input/output (I/O) interface 805 is also connected to the bus 804 .
- a number of components in the device 800 are connected to the I/O interface 805 , including: an input component 806 , such as a keyboard, mouse, etc.; an output component 807 such as various types of displays, speakers, etc.; a storage component 808 such as a magnetic disk, an optical disk, etc.; and a communication component 809 such as a network card, a modem, a wireless communication transceiver.
- the communication component 809 allows the device 800 to exchange information/data with other devices via a computer network such as the Internet and/or various telecommunication networks.
- the calculation component 801 may be a variety of general-purpose and/or special-purpose processing assemblies having processing and calculation capabilities. Some examples of the calculation component 801 include, but are not limited to, a central processing unit (CPU), a graphics processing unit (GPU), a variety of special-purpose artificial intelligence (AI) computing chips, a variety of calculation components running machine learning model algorithms, a digital signal processor (DSP), and any suitable processor, controller, microcontroller, etc.
- the calculation component 801 executes the methods and processes as described above, for example, in response to that a first packet sent by a target internal network machine is received, a first hash value obtained by performing hash calculation on the first packet is acquired.
- acquiring, in response to a first packet sent by a target internal network machine is received, a first hash value obtained by performing hash calculation on the first packet may be implemented as a computer software program, which is tangibly included in a machine-readable medium, for example, the storage component 808 .
- a part or all of the computer program may be loaded into and/or installed into the device 800 via the ROM 802 and/or the communication component 809 .
- the calculation component 801 In response to the computer program is loaded into the RAM 803 and executed by the calculation component 801 , at least one step of acquiring, in response to a first packet sent by a target internal network machine is received, a first hash value obtained by performing hash calculation on the first packet in the method described above are performed.
- the calculation component 801 may be configured to perform, in any other suitable manner (for example, by means of firmware), the method in which when a first packet sent by a target internal network machine is received, a first hash value obtained by performing hash calculation on the first packet is acquired.
- Various embodiments of the systems and techniques described above herein may be implemented in a digital electronic circuit system, an integrated circuit system, a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), an application specific standard product (ASSP), a system-on-chip (SOC), a complex programmable logic device (CPLD), computer hardware, firmware, software, and/or combinations thereof.
- FPGA field programmable gate array
- ASIC application specific integrated circuit
- ASSP application specific standard product
- SOC system-on-chip
- CPLD complex programmable logic device
- These various embodiments may include: implementations in at least one computer program, wherein the at least one computer programs can be executed and/or interpreted on a programmable system including at least one programmable processor, the programmable processor may be a special-purpose or general-purpose programmable processor, may receive data and instructions from a storage system, at least one input apparatus and at least one output apparatus, and may transmit the data and instructions to the storage system, the at least one input apparatus and the at least one output apparatus.
- Program codes for implementing the methods of the present disclosure may be written in any combination of at least one programming languages. These program codes may be provided to a processor or controller of a general-purpose computer, a special-purpose computer or other programmable data processing apparatuses, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowcharts and/or block diagram to be executed.
- the program codes may be entirely executed on a machine and partly executed on a machine, and as a standalone software package, partly executed on a machine and partly executed on a remote machine, or entirely executed on a remote machine or server.
- a machine-readable medium may be tangible media that may contain or store programs for use by an instruction execution system, apparatus or device, or for use in connection with the instruction execution system, apparatus or device.
- the machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium.
- the machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared or semiconductor system, apparatus or device, or any suitable combinations of the described content.
- machine-readable storage media include electrical connection based on at least one wire, a portable computer disk, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combinations of the described content.
- RAM random access memory
- ROM read-only memory
- EPROM or flash memory erasable programmable read-only memory
- CD-ROM compact disc read-only memory
- magnetic storage device or any suitable combinations of the described content.
- the systems and techniques described herein may be implemented on a computer having: a display apparatus (e.g. CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user; and a keyboard and a pointing apparatus (e.g. mouse or trackball) by which the user can provide an input to the computer.
- a display apparatus e.g. CRT (cathode ray tube) or LCD (liquid crystal display) monitor
- a keyboard and a pointing apparatus e.g. mouse or trackball
- Other kinds of apparatuses may also be used to provide interaction with the user; for example, feedback provided to the user can be any form of sensing feedback (e.g. visual feedback, auditory feedback or tactile feedback); and input from the user may be received in any form (including acoustic input, speech input or tactile input).
- the systems and techniques described herein may be implemented in a computing system including a backend component (e.g. as a data server), or a computing system including a midware component (e.g. an application server), or a computing system including a front-end component (e.g. a user computer having a graphical user interface or a web browser through which the user may interact with embodiments of the systems and techniques described herein), or computing systems including any combination of such a backend component, midware component, or front-end component.
- the components of the system may be interconnected by any form or medium of digital data communication (e.g. a communication network). Examples of the communication network include: a local area network (LAN), a wide area network (WAN), and an Internet.
- the computer system may include a client and a server.
- the client and the server are generally away from each other and typically interact via a communication network.
- a client-server relationship is generated by computer programs running on respective computers and having a client-server relationship to each other.
- the server may be a cloud server, may also be a server of a distributed system, or a server combined with a blockchain.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
-
- step S202, a mapping relationship between each public network machine in the public network gateway cluster and the first hash value is acquired; and
- step S204, the target gateway machine from the public network gateway cluster is selected on the basis of the mapping relationship and the first hash value.
Claims (18)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111064467.9A CN113810296A (en) | 2021-09-10 | 2021-09-10 | Distributing method, device, storage medium and electronic device for clustered gateway |
| CN202111064467.9 | 2021-09-10 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20230081696A1 US20230081696A1 (en) | 2023-03-16 |
| US12407609B2 true US12407609B2 (en) | 2025-09-02 |
Family
ID=78895080
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/657,708 Active 2044-02-20 US12407609B2 (en) | 2021-09-10 | 2022-04-01 | Methods for shunting clustered gateways |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US12407609B2 (en) |
| EP (1) | EP4149087B1 (en) |
| JP (1) | JP2023041022A (en) |
| KR (1) | KR102854966B1 (en) |
| CN (1) | CN113810296A (en) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113810296A (en) * | 2021-09-10 | 2021-12-17 | 北京百度网讯科技有限公司 | Distributing method, device, storage medium and electronic device for clustered gateway |
| CN115580579B (en) * | 2022-09-28 | 2024-06-04 | 杭州迪普科技股份有限公司 | Message forwarding method and device, electronic equipment and storage medium |
| CN120017589A (en) * | 2023-11-16 | 2025-05-16 | 腾讯科技(深圳)有限公司 | A data distribution method, device, equipment and storage medium |
| CN117614962B (en) * | 2023-11-23 | 2025-07-11 | 北京轻网科技股份有限公司 | Method and device for distributing session in tunnel of multi-core CPU |
Citations (40)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020097724A1 (en) | 2001-01-09 | 2002-07-25 | Matti Halme | Processing of data packets within a network element cluster |
| US6587866B1 (en) * | 2000-01-10 | 2003-07-01 | Sun Microsystems, Inc. | Method for distributing packets to server nodes using network client affinity and packet distribution table |
| US6697380B1 (en) * | 1999-12-07 | 2004-02-24 | Advanced Micro Devices, Inc. | Multiple key lookup arrangement for a shared switching logic address table in a network switch |
| US6748437B1 (en) * | 2000-01-10 | 2004-06-08 | Sun Microsystems, Inc. | Method for creating forwarding lists for cluster networking |
| US20050182841A1 (en) * | 2003-08-11 | 2005-08-18 | Alacritech, Inc. | Generating a hash for a TCP/IP offload device |
| US8259585B1 (en) * | 2009-04-17 | 2012-09-04 | Juniper Networks, Inc. | Dynamic link load balancing |
| US20130329727A1 (en) * | 2012-06-08 | 2013-12-12 | Cisco Technology, Inc. | System and method for layer-2 multicast multipathing |
| US8958293B1 (en) * | 2011-12-06 | 2015-02-17 | Google Inc. | Transparent load-balancing for cloud computing services |
| US9014191B1 (en) | 2012-09-28 | 2015-04-21 | Google Inc. | Separating routing domains for virtualized networks when implementing a tunneling protocol |
| US20150263899A1 (en) | 2014-03-14 | 2015-09-17 | Nicira, Inc. | Managed gateways peering with external router to attract ingress packets |
| US9306907B1 (en) * | 2011-02-16 | 2016-04-05 | Fortinet, Inc. | Load balancing among a cluster of firewall security devices |
| JP2016521090A (en) | 2013-06-07 | 2016-07-14 | アルカテル−ルーセント | Method and apparatus for providing software-defined network flow delivery |
| US9397946B1 (en) * | 2013-11-05 | 2016-07-19 | Cisco Technology, Inc. | Forwarding to clusters of service nodes |
| US9548927B2 (en) * | 2014-06-17 | 2017-01-17 | Comcast Cable Communications, Llc | Flow-based load balancing |
| US20170104681A1 (en) * | 2015-10-12 | 2017-04-13 | Futurewei Technologies, Inc. | Hash-Based Overlay Routing Architecture for Information Centric Networks |
| CN106980665A (en) * | 2017-03-21 | 2017-07-25 | 广东神马搜索科技有限公司 | Data dictionary implementation method, device and data dictionary management system |
| US20180157514A1 (en) * | 2016-12-06 | 2018-06-07 | Microsoft Technology Licensing, Llc | Network traffic management in computing systems |
| US20180192289A1 (en) | 2017-01-05 | 2018-07-05 | Huawei Technologies Co., Ltd. | Network Architecture Having Multicast and Broadcast Multimedia Subsystem Capabilities |
| CN109802985A (en) | 2017-11-17 | 2019-05-24 | 北京金山云网络技术有限公司 | Data transmission method, device, equipment and read/write memory medium |
| US20200045087A1 (en) * | 2018-07-31 | 2020-02-06 | Juniper Networks, Inc. | N:1 stateful application gateway redundancy model |
| CN108520025B (en) * | 2018-03-26 | 2020-12-18 | 腾讯科技(深圳)有限公司 | Service node determination method, device, equipment and medium |
| US20200403922A1 (en) * | 2019-06-24 | 2020-12-24 | Vmware, Inc. | Load balancing of l2vpn traffic over multiple ipsec vpn tunnels |
| CN112333135A (en) | 2020-07-16 | 2021-02-05 | 北京京东尚科信息技术有限公司 | Gateway determination method, device, server, distributor, system and storage medium |
| CN112367261A (en) * | 2020-11-30 | 2021-02-12 | 迈普通信技术股份有限公司 | Message forwarding method and device and distributed equipment |
| US10965598B1 (en) * | 2017-10-04 | 2021-03-30 | Cisco Technology, Inc. | Load balancing in a service chain |
| CN112632079A (en) * | 2020-12-30 | 2021-04-09 | 联想未来通信科技(重庆)有限公司 | Data stream identification query method and device |
| CN109361609B (en) * | 2018-12-14 | 2021-04-20 | 东软集团股份有限公司 | Packet forwarding method, device, equipment and storage medium of firewall equipment |
| CN110198307B (en) * | 2019-05-10 | 2021-05-18 | 深圳市腾讯计算机系统有限公司 | Method, device and system for selecting mobile edge computing node |
| CN112866115A (en) * | 2020-12-31 | 2021-05-28 | 杭州迪普科技股份有限公司 | Method, device, electronic equipment and storage medium for realizing transparent serial connection |
| US11099099B1 (en) * | 2015-01-07 | 2021-08-24 | Aviatrix Systems, Inc. | System and method for selecting virtual appliances in communications with virtual private cloud networks |
| CN113630319A (en) * | 2021-06-28 | 2021-11-09 | 济南浪潮数据技术有限公司 | Data distribution method, device and related equipment |
| WO2021244450A1 (en) * | 2020-05-30 | 2021-12-09 | 华为技术有限公司 | Communication method and apparatus |
| CN113794788A (en) * | 2021-09-14 | 2021-12-14 | 北京百度网讯科技有限公司 | Gateway diversion method, system, device, equipment, storage medium and product |
| CN113810296A (en) * | 2021-09-10 | 2021-12-17 | 北京百度网讯科技有限公司 | Distributing method, device, storage medium and electronic device for clustered gateway |
| US20220206908A1 (en) * | 2020-12-30 | 2022-06-30 | Oracle International Corporation | Techniques for replicating state information for high availability |
| US20220263789A1 (en) * | 2021-02-12 | 2022-08-18 | Oracle International Corporation | Scaling ip addresses in overlay networks |
| US20230036071A1 (en) * | 2021-07-27 | 2023-02-02 | Vmware, Inc. | Managing edge gateway selection using exchanged hash information |
| US20230239274A1 (en) * | 2022-01-21 | 2023-07-27 | Vmware, Inc. | Managing exchanges between edge gateways in a cloud environment to support a private network connection |
| CN112650704B (en) * | 2020-12-04 | 2024-02-06 | 北京天融信网络安全技术有限公司 | NAT processing method and device under distributed multi-board shunt and electronic equipment |
| US12073241B2 (en) * | 2015-12-02 | 2024-08-27 | Nicira, Inc. | Learning of tunnel endpoint selections |
-
2021
- 2021-09-10 CN CN202111064467.9A patent/CN113810296A/en active Pending
-
2022
- 2022-04-01 US US17/657,708 patent/US12407609B2/en active Active
- 2022-04-05 EP EP22166840.3A patent/EP4149087B1/en active Active
- 2022-09-02 JP JP2022139620A patent/JP2023041022A/en active Pending
- 2022-09-02 KR KR1020220111096A patent/KR102854966B1/en active Active
Patent Citations (43)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6697380B1 (en) * | 1999-12-07 | 2004-02-24 | Advanced Micro Devices, Inc. | Multiple key lookup arrangement for a shared switching logic address table in a network switch |
| US6587866B1 (en) * | 2000-01-10 | 2003-07-01 | Sun Microsystems, Inc. | Method for distributing packets to server nodes using network client affinity and packet distribution table |
| US6748437B1 (en) * | 2000-01-10 | 2004-06-08 | Sun Microsystems, Inc. | Method for creating forwarding lists for cluster networking |
| US20020097724A1 (en) | 2001-01-09 | 2002-07-25 | Matti Halme | Processing of data packets within a network element cluster |
| US20050182841A1 (en) * | 2003-08-11 | 2005-08-18 | Alacritech, Inc. | Generating a hash for a TCP/IP offload device |
| US8259585B1 (en) * | 2009-04-17 | 2012-09-04 | Juniper Networks, Inc. | Dynamic link load balancing |
| US9306907B1 (en) * | 2011-02-16 | 2016-04-05 | Fortinet, Inc. | Load balancing among a cluster of firewall security devices |
| US8958293B1 (en) * | 2011-12-06 | 2015-02-17 | Google Inc. | Transparent load-balancing for cloud computing services |
| US20130329727A1 (en) * | 2012-06-08 | 2013-12-12 | Cisco Technology, Inc. | System and method for layer-2 multicast multipathing |
| US9014191B1 (en) | 2012-09-28 | 2015-04-21 | Google Inc. | Separating routing domains for virtualized networks when implementing a tunneling protocol |
| JP2016521090A (en) | 2013-06-07 | 2016-07-14 | アルカテル−ルーセント | Method and apparatus for providing software-defined network flow delivery |
| US9397946B1 (en) * | 2013-11-05 | 2016-07-19 | Cisco Technology, Inc. | Forwarding to clusters of service nodes |
| US20150263899A1 (en) | 2014-03-14 | 2015-09-17 | Nicira, Inc. | Managed gateways peering with external router to attract ingress packets |
| US9548927B2 (en) * | 2014-06-17 | 2017-01-17 | Comcast Cable Communications, Llc | Flow-based load balancing |
| US11099099B1 (en) * | 2015-01-07 | 2021-08-24 | Aviatrix Systems, Inc. | System and method for selecting virtual appliances in communications with virtual private cloud networks |
| US20170104681A1 (en) * | 2015-10-12 | 2017-04-13 | Futurewei Technologies, Inc. | Hash-Based Overlay Routing Architecture for Information Centric Networks |
| US12073241B2 (en) * | 2015-12-02 | 2024-08-27 | Nicira, Inc. | Learning of tunnel endpoint selections |
| US20180157514A1 (en) * | 2016-12-06 | 2018-06-07 | Microsoft Technology Licensing, Llc | Network traffic management in computing systems |
| US20180192289A1 (en) | 2017-01-05 | 2018-07-05 | Huawei Technologies Co., Ltd. | Network Architecture Having Multicast and Broadcast Multimedia Subsystem Capabilities |
| CN106980665A (en) * | 2017-03-21 | 2017-07-25 | 广东神马搜索科技有限公司 | Data dictionary implementation method, device and data dictionary management system |
| US10965598B1 (en) * | 2017-10-04 | 2021-03-30 | Cisco Technology, Inc. | Load balancing in a service chain |
| CN109802985A (en) | 2017-11-17 | 2019-05-24 | 北京金山云网络技术有限公司 | Data transmission method, device, equipment and read/write memory medium |
| US20200351328A1 (en) | 2017-11-17 | 2020-11-05 | Beijing Kingsoft Cloud Network Technology Co., Ltd. | Data transmission method, device, equipment, and readable storage medium |
| CN108520025B (en) * | 2018-03-26 | 2020-12-18 | 腾讯科技(深圳)有限公司 | Service node determination method, device, equipment and medium |
| US20200045087A1 (en) * | 2018-07-31 | 2020-02-06 | Juniper Networks, Inc. | N:1 stateful application gateway redundancy model |
| CN109361609B (en) * | 2018-12-14 | 2021-04-20 | 东软集团股份有限公司 | Packet forwarding method, device, equipment and storage medium of firewall equipment |
| CN110198307B (en) * | 2019-05-10 | 2021-05-18 | 深圳市腾讯计算机系统有限公司 | Method, device and system for selecting mobile edge computing node |
| US20200403922A1 (en) * | 2019-06-24 | 2020-12-24 | Vmware, Inc. | Load balancing of l2vpn traffic over multiple ipsec vpn tunnels |
| WO2021244450A1 (en) * | 2020-05-30 | 2021-12-09 | 华为技术有限公司 | Communication method and apparatus |
| CN112333135A (en) | 2020-07-16 | 2021-02-05 | 北京京东尚科信息技术有限公司 | Gateway determination method, device, server, distributor, system and storage medium |
| CN112367261A (en) * | 2020-11-30 | 2021-02-12 | 迈普通信技术股份有限公司 | Message forwarding method and device and distributed equipment |
| CN112650704B (en) * | 2020-12-04 | 2024-02-06 | 北京天融信网络安全技术有限公司 | NAT processing method and device under distributed multi-board shunt and electronic equipment |
| CN112632079A (en) * | 2020-12-30 | 2021-04-09 | 联想未来通信科技(重庆)有限公司 | Data stream identification query method and device |
| US20220206908A1 (en) * | 2020-12-30 | 2022-06-30 | Oracle International Corporation | Techniques for replicating state information for high availability |
| CN112866115A (en) * | 2020-12-31 | 2021-05-28 | 杭州迪普科技股份有限公司 | Method, device, electronic equipment and storage medium for realizing transparent serial connection |
| US20220263789A1 (en) * | 2021-02-12 | 2022-08-18 | Oracle International Corporation | Scaling ip addresses in overlay networks |
| CN113630319A (en) * | 2021-06-28 | 2021-11-09 | 济南浪潮数据技术有限公司 | Data distribution method, device and related equipment |
| US20230036071A1 (en) * | 2021-07-27 | 2023-02-02 | Vmware, Inc. | Managing edge gateway selection using exchanged hash information |
| CN113810296A (en) * | 2021-09-10 | 2021-12-17 | 北京百度网讯科技有限公司 | Distributing method, device, storage medium and electronic device for clustered gateway |
| EP4149087A1 (en) * | 2021-09-10 | 2023-03-15 | Beijing Baidu Netcom Science And Technology Co., Ltd. | Methods and apparatuses for shunting clustered gateways, storage medium, and electronic device |
| US20230081696A1 (en) * | 2021-09-10 | 2023-03-16 | Beijing Baidu Netcom Science Technology Co., Ltd. | Methods for Shunting Clustered Gateways |
| CN113794788A (en) * | 2021-09-14 | 2021-12-14 | 北京百度网讯科技有限公司 | Gateway diversion method, system, device, equipment, storage medium and product |
| US20230239274A1 (en) * | 2022-01-21 | 2023-07-27 | Vmware, Inc. | Managing exchanges between edge gateways in a cloud environment to support a private network connection |
Non-Patent Citations (5)
| Title |
|---|
| Chinese First Search Report issued for Chinese Patent Application No. 2021110644679, received on Mar. 8, 2022. |
| Chinese Supplementary Search Report issued for Chinese Patent Application No. 2021110644679, received on Jun. 4, 2022. |
| Extended European Search Report issued for counterpart EP application No. 22166840.3 and issued on Sep. 15, 2022. |
| First Japanese Office Action issued for counterpart JP application No. 2022-139620 and issued on Nov. 28, 2023. |
| First Korean Office Action issued for counterpart KR application No. 10-2022-0111096 and issued on Dec. 12, 2024. |
Also Published As
| Publication number | Publication date |
|---|---|
| US20230081696A1 (en) | 2023-03-16 |
| EP4149087A1 (en) | 2023-03-15 |
| EP4149087B1 (en) | 2025-05-28 |
| KR102854966B1 (en) | 2025-09-05 |
| KR20230038100A (en) | 2023-03-17 |
| CN113810296A (en) | 2021-12-17 |
| JP2023041022A (en) | 2023-03-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12407609B2 (en) | Methods for shunting clustered gateways | |
| CN111367983B (en) | Database access method, system, device and storage medium | |
| EP4106293A2 (en) | Network configuring method and apparatus for cloud mobile phone, device and storage medium | |
| CN113794788B (en) | Gateway diversion method, system, device, equipment, storage medium and product | |
| CN113726883A (en) | Cloud data processing method, related device and computer program product | |
| US12489786B2 (en) | Method and apparatus for determining compromised host | |
| CN118118443A (en) | Virtual machine access method, device, equipment and storage medium | |
| CN113656198A (en) | Copying and pasting method and device from client to cloud mobile phone | |
| CN114338529B (en) | Five-tuple rule matching method and device | |
| CN116016448A (en) | Service network access method, device, equipment and storage medium | |
| CN114928591A (en) | Method, device and medium for adding IP address of virtual machine | |
| CN118300994B (en) | Virtual network management method, device, equipment and storage medium based on cloud phone | |
| EP3993366B1 (en) | Network load balancer, request message distribution method, program product and system | |
| CN117729006A (en) | Routing risk analysis method, device, electronic equipment and media based on VPC network | |
| CN115514718B (en) | Data interaction method, control layer and equipment based on data transmission system | |
| CN115484233B (en) | Method, device, equipment and medium for forwarding link aggregation messages in data communication chips | |
| CN117195263A (en) | Database encryption method and device | |
| CN117014371A (en) | Network traffic processing method and device, electronic equipment and storage medium | |
| CN104994137B (en) | A method of network transparent proxy | |
| CN111200692B (en) | Voice equipment, processing method, device and storage medium for network telephone | |
| CN116436971A (en) | Integrated chemical industry accuse machine system | |
| CN116260855B (en) | Communication method, device, electronic device, and storage medium | |
| CN107357853A (en) | A kind of operating method, device and the computer system of REDIS consoles | |
| CN114827055B (en) | Data mirroring method and device, electronic equipment and switch cluster | |
| CN113556370A (en) | Service calling method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: BEIJING BAIDU NETCOM SCIENCE TECHNOLOGY CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HUANG, ZHIFENG;ZHANG, WANSHENG;REEL/FRAME:059476/0981 Effective date: 20211110 |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |